There was a really good presentation at Bsides by one of the Intrepidis guys on this. He attacked the protocols, auth mechanisms, and other aspects using a variety of MiTM attacks... Ill see if i can dig it up.

From what i know it seems like the easiest way to Pen Test a Cell phone or other mobile device is through blue-tooth hacking. I've read stuff about cloning cell phones as well but idk if that falls under the same category.

I was just wondering, what are people here telling their customers after a pentest of mobile devices? Should they disable bluetooth all together? Create complicated 5 pin codes? Encrypt them if applicable? Add antivirus where applicable? It just seems like there are so many attack vectors with the mobile devices, it would be hard to nail down a secure way for all customers to use them 24-7. Not to mention, the browser being vulnerable. Just curious since I see so many companies now going to IPhones, Ipads, and Androids. Thanks.